Implement attacks against wireless networks

Assignment Help Computer Network Security
Reference no: EM132593534

INFO 4370 Security of Wireless Systems - Kwantlen Polytechnic University

Term Project: This course includes a required technical term project. The goal of the project is for students to develop a series of laboratory exercises or experiments for wireless network security. These laboratory exercises will be designed to demonstrate the vulnerability that exists in a wireless network by designing wireless network attacks such as ( but not limited to) War driving, Eavesdropping, WEP Key Cracking/Decryption, Man in the Middle attack , MAC Spoofing, ARP Cache Poisoning, and ARP Request Replay. Students will use open source tools such as Aircrack-ng, Cain and Abel, and Mac Makeup in these laboratory exercises to demonstrate how these attacks are conducted. Students will also design countermeasures or defenses to demonstrate how these attacks can be thwarted. Students have freedom to choose the types of attacks to simulate and approach for studying them. It is expected that all term projects will require some amount of additional research and reading.

Create MAC spoofing attack on an open network for our project

Objective of the Project:

The student will gain insight into the wireless offensive security field, which will expand awareness for the need of real world security solutions.

The student will learn to implement attacks against wireless networks in a controlled environment.

The student will learn to provide measures or defenses against wireless attacks.

The student will gain understanding to available wireless attack and monitoring tools for different operating systems.

Developing the project

Do through research on wireless vulnerabilities and decide on the vulnerabilities you want to experiment with. When you have decided on the vulnerabilities you want to work on, look into open source tools that will help you design various experiments. Create your environment in the lab where you can experiment with your chosen vulnerabilities. Keep in mind that the purpose of the experiments is to demonstrate the weaknesses of Wireless system and to design mechanisms of defense against these vulnerabilities.

Requirements:

• Your final report must be professionally written, technical and precise. Avoid verbosity. You will be graded on the content and the presentation, but not on the length of the document. The paper should be written in your own words. All sources consulted should be explicitly cited. Bibliographic entries should be complete. Direct quotation should only be used when appropriate. All direct quotations should be clearly identified in the text.

• Your report should normally have the following logical components; the keyword is logical -- physical organization of the paper can again vary enormously depending on personal style and nature of the topic but can still have the logical components.

Introduction: The problem statement (what & why), how it is related to Wireless security in general, aim and scope and nature of the present study.

Basic Terminology and existing literature: Do not try to define everything -- you'll define only those things that are important for understanding the subsequent material and that are not expected of any INFO 4370 student.

Main Results: Depending on what you have done (use as many subsections as you wish. For each experiment include the following:

Purpose of the experiment
Test Environment (Hardware/Software)
o Hardware Configuration of victim machine
o Operating System used in victim machine
o Hardware Configuration of intruder machine
o Operating System used in intruder machine
o Software tools used in victim machine
o Software tools in intruder machine

Network Topology (Test Experiment Scenarios)
Step by step procedures of the experiment (mounting the attack) Experimental results (with screen shots)
Analysis of the result
Measures /Defenses used to detect or thwart the attack

Conclusion: Give a summary, highlight the main points of your study, and discuss limitations and further work that can be done.

Attachment:- Project.rar

Reference no: EM132593534

Questions Cloud

Revitalizing a brand-current marketing communication : Describe the current marketing communication, identity, and brand position of Plaza Home Health Services.
Calculate equivalent units schedule : Conversion costs RM15,000. Calculate equivalent units schedule. Calculate the unit costs (Note: Round answer to two decimal places)
Discuss the elements of organizational designs : Discuss the elements of organizational designs and how organizational design is linked to organizational behavior, communication, delegation, job satisfaction,
What are some of most critical ratios : What are some of the most critical ratios that we've discussed this week? Which ratios strictly related to profitability?
Implement attacks against wireless networks : Implement attacks against wireless networks in a controlled environment - provide measures or defenses against wireless attacks
Creation of areas like the valley of death : What attitudes and values on the part of business and others lead to the creation of areas like the "Valley of Death?"
What are carol tax consequences as a result : Corporation, a US corporation, in exchange for one payment of $1,000 paid to her Swiss bank account, What are Carol tax consequences as a result
Compute Riggs diluted EPS for the year ended December : Common stock ($1 par, 300,000 shares issued 300,000 Additional paid-in capital 2,100,000, Compute Riggs diluted EPS for the year ended December
VPN useful in business world : Describe a scenario where you might find a VPN useful in the business world. What are some major concerns you might have as a network manager?

Reviews

len2593534

8/6/2020 9:33:30 PM

Hello, we create MAC spoofing attack on an open network for our project , now I'm looking for a tutor who can work on our report, I already start but still couple of requirements are left and I might need help with editing as well. I have attached my report and requirements pdf Note: I should submit the report within six hours so please let me know if you could finish it on time Thanks in Advance

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd